Which two technologies use the ENCRYPT_MAC configuration parameter to control the level of message authentication code (MAC) generation? (Choose two.)
A . On-disk encryption
B . Enterprise Replication
C . Column level encryption
D . High-Availability Data Replication
E . Server-to-server distributed query communication
Answer: B,D